Abstract
5G technologies are envisaged supporting novel use-cases for vertical industries. All the verticals, however, originate numerous use scenarios with different needs that 5G networks have to sustain effectively in the future. At present, “network slicing” is the key research direction that has attracted a lot of attention and we therefore focus on the 5G network slicing security in the following. First, we introduce the technical background and architecture of 5G, explain the architecture of SDN/NFV and the threats to information security, and discuss the privacy of 5G. Besides spotlighting “Network Slicing Security,” including inter-slice and intra-slice security threats and harmonized resource between inter-domain slice segments, the final part also mentions security risks related to 5G network slicing and corresponding solutions identified by 3GPP.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
3GPP: Release 16. https://www.3gpp.org/release-16 (2019)
3GPP: Release 17. https://www.3gpp.org/release-17 (2020)
Shi, Y., Han, Q., Shen, W., Zhang, H.: Potential applications of 5G communication technologies in collaborative intelligent manufacturing. IET Collaborative Intell. Manuf. 1(4) (2019). http://doi.org/10.1049/iet-cim.2019.0007
Fifth Generation of Mobile Telecommunications Networks (5G). ENISA, Heraklion, Greece (2019)
The Evolution of Security in 5G: A, ‘Slice’ of Mobile Threats. 5G Americas, Bellevue, WA, USA (2019)
Network Slicing for 5G Networks& Services. 5G Americas, Bellevue, WA, USA (2016)
Ji, X., et al.: Overview of 5G security technology. Sci. China Inf. Sci. 61(8) (2018). http://doi.org/10.1007/s11432-017-9426-4
Study on Security Aspects of 5G Network Slicing Management (Release 15) V15.0.0, document 3GPP TR33.811 (2018)
Olimid, R.F., Nencioni, G.: 5G network slicing: a security overview. IEEE Access 8, 99999–100009 (2020)
Jinsong, M., Yamin, M.: 5G network and security (2020). http://doi.org/10.23919/indiacom49435.2020.9083731
Chica, J.C.C., Imbachi, J.C., Vega, J.F.B.: Security in SDN: a comprehensive survey. J. Netw. Comput. Appl. 159, 102595 (2020). http://doi.org/10.1016/j.jnca.2020.102595
Lal, S., Taleb, T., Dutta, A.: NFV: security threats and best practices. IEEE Commun. Mag. 55(8) (2017). http://doi.org/10.1109/mcom.2017.1600899
Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., Gurtov, A.: Overview of 5G security challenges and solutions. IEEE Commun. Stan. Mag. 2(1) (2018). http://doi.org/10.1109/mcomstd.2018.1700063
Murillo, A.F., Rueda, S.J., Morales, L.V., Cárdenas, Á.A.: SDN and NFV security: challenges for integrated solutions. In: Computer Communications and Networks, pp. 75–101. Springer International Publishing, Berlin (2017)
Ordonez-Lucena, J., Ameigeiras, P., Lopez, D., Ramos-Munoz, J.J., Lorca, J., Folgueira, J.: Network slicing for 5G with SDN/NFV: concepts, architectures, and challenges. IEEE Commun. Mag. 55(5), 8087 (2017)
Blanc, G., Kheir, N., Ayed, D., Lefebvre, V., de Oca, E.M., Bisson, P.: Towards a 5G security architecture (2018). http://doi.org/10.1145/3230833.3233251
Huawei: Huawei: 5G Security Architecture White Paper. Huawei, Shenzhen, China (2017)
Ting, T.-H., Lin, T.-N., Shen, S.-H., Chang, Y.-W.: Guidelines for 5G end to end architecture and security issues (2019). http://arxiv.org/abs/1912.10318
Schinianakis, D., Trapero, R., Michalopoulos, D.S., Crespo, B.G.-N.: Security considerations in 5G networks: a slice aware trust zone approach. In: Proceedings of IEEE Wireless Communication Networks Conference (WCNC), p. 18, Apr 2019
Liyanage, M., Salo, J., Braeken, A., Kumar, T., Seneviratne, S., Ylianttila, M.: 5G privacy: scenarios and solutions (2018). http://doi.org/10.1109/5gwf.2018.8516981
Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., Gurtov, A.: 5G security: analysis of threats and solutions (2017). http://doi.org/10.1109/cscn.2017.8088621
Arfaoui, G., Bisson, P., Blom, R., Borgaonkar, R., Englund, H., Félix, E., Klaedtke, F., Nakarmi, P.K., Näslund, M., O’Hanlon, P., Papay, J., Suomalainen, J., Surridge, M., Wary, J.-P., Zahariev, A.: A security architecture for 5G networks. IEEE Access 6, 22466–22479 (2018)
Study on Security Aspects of Enhanced Network Slicing (Release 16) V0.8.0, document 3GPP TR33.813 (2019)
Security Architecture and Procedures for 5G System (Release 16) V16.2.0, document 3GPP TS33.501 (2020)
NMNG Alliance: 5G Security Recommendations, Package #2: Network Slicing, NMGN, Frankfurt, Germany (2016). https://www.ngmn.org/wp-content/uploads/Publications/2016/160429_NGMN_5G_Security_Network_Slicing_v1_0.pdf
5G Security White Paper-Security Makes 5G Go Further. ZTE, Shenzhen, China (2019)
Cao, J., Ma, M., Li, H., Ma, R., Sun, Y., Yu, P., Xiong, L.: A survey on security aspects for 3GPP 5G networks. IEEE Commun. Surveys Tuts. 22(1), 170195 (2020)
Cunha, V.A., da Silva, E., de Carvalho, M.B., Corujo, D., Barraca, J.P., Gomes, D., Granville, L.Z., Aguiar, R.L.: Network slicing security: challenges and directions. Internet Technol. Lett. 2(5), e125 (2019). http://doi.org/10.1002/itl2.125
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Wu, TY., Jie, T.F. (2022). 5G Network Slicing Security. In: Nicopolitidis, P., Misra, S., Yang, L.T., Zeigler, B., Ning, Z. (eds) Advances in Computing, Informatics, Networking and Cybersecurity. Lecture Notes in Networks and Systems, vol 289. Springer, Cham. https://doi.org/10.1007/978-3-030-87049-2_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-87049-2_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-87048-5
Online ISBN: 978-3-030-87049-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)